|Numéro de publication||US5408528 A|
|Type de publication||Octroi|
|Numéro de demande||US 08/261,315|
|Date de publication||18 avr. 1995|
|Date de dépôt||16 juin 1994|
|Date de priorité||27 févr. 1991|
|État de paiement des frais||Payé|
|Autre référence de publication||CA2058814A1, CA2058814C, DE69214978D1, DE69214978T2, EP0501903A1, EP0501903B1, WO1992016067A1|
|Numéro de publication||08261315, 261315, US 5408528 A, US 5408528A, US-A-5408528, US5408528 A, US5408528A|
|Inventeurs||David G. Carlson, Thomas E. Miller|
|Cessionnaire d'origine||International Business Machines Corporation|
|Exporter la citation||BiBTeX, EndNote, RefMan|
|Citations de brevets (13), Citations hors brevets (12), Référencé par (96), Classifications (15), Événements juridiques (3)|
|Liens externes: USPTO, Cession USPTO, Espacenet|
This application is a continuation of application Ser. No. 07/661,732 filed Feb. 27, 1991, (now abandoned).
This invention relates to the data processing field. More particularly, this invention allows the recipient of a telephone call to analyze call information associated with the telephone call to determine optimal routing of the telephone call.
The telecommunications industry has seen significant technological advancements in the last few years. Long gone are the days of yesteryear where the telephone was praised as a simple, handy, and relatively private device used to communicate primarily with friends, loved ones, and local merchants.
Today, the owner of a telephone is as likely to curse the telephone as to praise it. He is often greeted upon his arrival home after a long day of work with a barrage of unsolicited phone calls originating from parties unknown, all trying to sell him their particular goods or services. Screening of incoming calls via use of an answering machine is a partial answer, but tends to annoy family, friends, and others known by the owner of the telephone to have a less sinister reason to call, since all calls must go through the answering machine to be screened. In addition, many "friendly" callers have a condition known as "answering machine phobia" and will hang up after a short number of rings so as not to get the answering machine.
Some of the regional telephone companies in the United States now offer their customers a service called "Caller ID". Caller ID displays the telephone number of the incoming call to the telephone owner as the telephone rings. The owner can look at the number and decide whether he should answer the call or not. Although Caller ID has several advantages over answering machines, it has its limitations. Often, the owner cannot remember if the telephone number being displayed is one he recognizes as being "friendly" or not, and often errs in answering the phone when he didn't want to and vice versa.
The technological "advancements" of the telephone have caused other problems for the owner of the phone as well. When the owner wants to initiate a call to a business to inquire about goods or services, the friendly local merchant of yesteryear often no longer answers the phone. Instead, the owner's call is received by a complex telemarketing facility located somewhere in the world. The owner must then often endure delay and frustration as his call is bounced around inside the telemarketing facility in a search for a telemarketer possessing the skills necessary to respond to this specific inquiry. The owner may also be required to respond to a complex series of prompts emanating from a recorded, robot-like voice by pressing a series of numbers or other characters on the telephone keypad. These crude methods of call routing are unsatisfactory to the telemarketing facilities as well, since their telemarketers are being used inefficiently. More importantly, their customers are unhappy and agitated, and may decide to take their business elsewhere.
It is a primary object of the invention to provide an enhanced mechanism for handling incoming telephone calls.
It is another object of the invention to provide an automated mechanism for efficiently screening out unwanted calls.
It is another object of the invention to provide an automated mechanism for efficiently routing an incoming telephone call to an optimal destination.
These and other objects are accomplished by the method and apparatus for flexible and optimal telephone call acceptance and routing disclosed herein.
A telephone call is made by a calling party. The telephone call is routed through a telephone network to a piece of terminal equipment. The terminal equipment analyzes call information associated with the telephone call. The call information is divided into separate call attributes, such as calling telephone number and called telephone number. One or more number lists, stored in the terminal equipment, are then searched to see if they contain an entry that matches the call attributes. If a match is not found, the call is rejected. If one or more matches is found, the call is routed as specified by the number list entry having the most optimal match. The number lists can be easily user-modified.
FIG. 1 shows the communications environment of the invention.
FIG. 2 shows the terminal equipment of the invention.
FIG. 3 shows the contents of the storage of the terminal equipment of the invention in more detail.
FIG. 4A shows exemplary number lists of the invention used in the preferred embodiment.
FIG. 4B shows exemplary search trees for the number lists of FIG. 4A.
FIG. 5 shows an exemplary number list of the invention used in an alternate embodiment.
FIGS. 6A-6C show a flowchart of the suitably programmed terminal equipment of the invention.
FIGS. 7A-7C show computer screens used to modify information contained in the number lists of the invention.
FIG. 1 shows the communications environment of the invention. Telephone 10 is able to originate a call that is received by telephone 18 via terminal equipment 12, telecommunications network 15, and terminal equipment 20. In the preferred embodiment, network 15 is an Integrated Services Digital Network, more commonly known as ISDN, although other telecommunications networks, from present-day DTMF-based networks to future networks not yet contemplated, could also be used. Any telecommunications network capable of transmitting call information associated with a telephone call could be used.
Network 15 supports connection of up to thousands of pieces of terminal equipment such as terminal equipment 12 and terminal equipment 20 shown in FIG. 1. The terminal equipment connected to network 15 supports the protocol of network 15 and allows for communications to occur between pieces of terminal equipment and any attached telephones. Although FIG. 1 shows one telephone connected to each piece Of terminal equipment, anywhere from zero to several hundred telephones could be connected to each piece of terminal equipment.
Terminal equipment 12 could reside in the same physical location as its supported telephones or be remotely located in a local, regional, or national telephone exchange. While in the preferred embodiment, telephone 10 and terminal equipment 12, and telephone 18 and terminal equipment 20, are discrete components, in an alternate embodiment a telephone and terminal equipment can be combined into a single unit. This combination may be particularly appropriate in a residential or small office environment, where a powerful piece of terminal equipment connected to hundreds of telephones is not needed.
FIG. 2 shows terminal equipment 20 in more detail. Terminal equipment 20 contains network interface 21, processor 23, storage 30, and telephone interface 25. Network interface 21 allows terminal equipment 20 to communicate with network 15. Network interface 21 receives telephone Calls originated by other telephones in the network, and also transmits telephone calls originated by telephones connected to terminal equipment 20 via line 17. Line 17 is not required if there are no telephones to connect to, such as for data calls between pieces of terminal equipment, or instances where the terminal equipment answers voice calls via digitized speech or routes calls back through network 15.
Processor 23, suitably programmed as shown in the flowchart of FIGS. 6A-6C, performs the acceptance/rejection and optimized routing of incoming telephone calls received by terminal equipment 20, as will be discussed in more detail later. Processor 23 could be a very simple microprocessor, Such as an Intel 8088, or be part of a more complex processing environment found in microcomputers, midrange computers, or even mainframe computers.
Telephone interface 25 is connected to processor 23 and allows terminal equipment 20 to communicate with one or more telephones such as telephone 18 (FIG. 1) connected to telephone interface 25 via line 17. The complexity of telephone interface 25 depends largely on the number of telephones supported by terminal equipment 20. If only one or at most a few telephones are supported, telephone interface 25 could be very simple switching logic found in conventional multiplexors or other logic gates well known to those of skill in the art. Telephone interface 25 is not required if terminal equipment 70 is not connected to any telephones. Conversely if dozens, hundreds, or even thousands of telephones are supported, telephone interface 25 becomes much more complex. The power of a Private Branch Exchange (PBX) or similar device or a software program capable of communicating with such a device may be desirable.
In the preferred embodiment, processor 23 and storage 30 are components of an Application System/400 midrange Computer system manufactured by International Business Machines-Corporation. Network interface 21 is an ISDN Basic Rate Interface adapter integrated into the AS/400. Line 16 is an RJ45 cable. Telephone interface 25 is a CallPath/400 telephony enabler licensed program product, also manufactured by the IBM Corporation. Further details concerning the communications environment of the preferred embodiment can be seen in the unpublished IBM Manual "Communications: Integrated Services Digital Network Guide (SC41-0003), hereby incorporated by reference and attached hereto as Appendix I and in the IBM Manual "Communications: CallPath/400 Programmer's Reference" (GC21-9867), also hereby incorporated by reference and attached hereto as Appendix II.
Referring again to FIG. 2, Storage 30 is connected to processor 23. Storage 30 contains data used by suitably programmed processor 23 to decide whether to accept or reject an incoming call, and, if accepted, route the call to the appropriate telephone. The contents of storage 30 is shown in more detail in FIG. 3. Storage 30 contains one or more number lists 31 and one or more search trees 32. Each number list in storage 30 contains the same number of rows (such as row 33) and columns (such as column 34) as the other number lists in storage 30. Each row of a number list is a number list entry. A number list entry contains one or more columns of number list data. As will be seen in more detail later, the number list data is used to determine optimized routing or rejection of an incoming call. The number of rows, columns, and number lists is variable and can change depending on the functionality desired.
Search trees 32 are used in the preferred embodiment to speed up the searching of the number list data, but are not required in an alternate embodiment. If search trees 32 are used, one search tree exists for each column (such as column 34) of a number list. Since each number list in number lists 31 contains four columns, four search trees are shown as search trees 32.
Each search tree contains entries, such as entry 35. A search tree contains a number of entries that equals the total number of number list entries in all number lists. Since there are a total of fifteen number list entries in number lists 31, each search tree contains fifteen entries.
The first search tree contains number list data from the first column of each number list. A search tree entry contains three columns of search tree data. Column 37 of search tree entry 35 contains number list data in the first row and first column of the second number list (shown here as "5551212"). Column 38 contains an indication of the number list from which this number list data came (shown here as "02"--indicating number list 02). Column 39 contains an indication of the row in the number list from which this number list data came (shown here as "01"--indicating the first row of the number list).
In the preferred embodiment, the search tree entries are sorted by number list data, number list, and row to improve performance. For example, the three entries preceding entry 35 would contain number list data from the first column of the number lists entries with numbers smaller than "5551212". The remaining entries following entry 35 in the first search tree would contain number list data from the first column in the remainder of the number lists entries with numbers larger than "5551212" followed by any wild card entries (such as "608#") and any generic entries (such as "*ANY").
The second search tree contains number list data from the second column of each number list again sorted to improve performance. Entry 36 contains number list data from the first row of the second column of the second number list (shown here as "23"). The remainder of the second search tree, as well as the third and fourth search trees, follow the same organizational pattern. As one of skill in the art would quickly realize, the search tree organization pattern shown here is but one of several different but equivalent possible organization patterns that could be used to speed up the searching of number list data.
FIG. 4A shows exemplary number lists of the invention that could be used in an inbound telemarketing application, where the terminal equipment receives thousands of calls daily. Three number lists are shown. These number lists contain four columns of number list data. The first column contains the calling party's telephone number. The second column contains the calling party's subaddress. A subaddress can be inputted by the originator of the telephone call or by the originating terminal equipment and can provide additional information about the calling party. For example, a calling party subaddress of "13" may indicate that the caller is a married white female between 30-50 years of age with an annual income in excess of $50,000.
The third column contains the called party's telephone number. The fourth column contains a called party subaddress, containing additional information about the purpose of the call. For example, a calling party subaddress of "09" may be a code contained in a magazine advertisement and inputted by the originator of the call which indicates that the caller is interested in learning more about an international stock mutual fund.
In our example of FIG. 4A, the terminal equipment in the inbound telemarketing center would receive a telephone call. The telephone call would be accompanied by call information associated with the telephone call. The terminal equipment would divide the call information into one or more call attributes. The call attributes, in this example, are the calling party number, calling party subaddress, called party number, and called party subaddress. Environment attributes indicating information about the receiver of the call, if present, are determined and added to the call attributes.
These attributes are compared with each number list entry, looking for one or more matches. A "match" can be either an exact match, a wildcard match, or a generic match. An exact match is where all attributes match exactly with all number list data in a number list entry. Note that in the preferred embodiment number list data of "NONE" is considered to be an exact match for an attribute containing no data. A wildcard match is where one or more attributes does not match number list data exactly, but where a truncated version of the attribute does match number list data in a number list entry. For example, the phone number 6081111211 would not exactly match number list data 608#, but a truncated version of the phone number will match. The "#" sign is one of a multitude of representations of a left to right truncation operation. In an alternate embodiment, other wildcards besides left to right truncation could be used. For example, number list data of $555# would match a truncated version of call attribute 6085551111, since this call attribute contains the string "555". The "$" sign is one of a multitude of representations of a right to left truncation operation.
A generic match is where one or more attributes does not match number list data in a number list entry exactly, but where the number list data indicates that any value for the attribute is acceptable. For example, the phone number 6081111211 would not exactly match number list data *ANY, but *ANY indicates that any phone number, including 6081111211, is acceptable.
Note that a number list entry indicated as a wildcard match of a generic match with the attributes from an incoming call and receiver's environment may actually contain one or more number list entries that are identical to a specific attribute. For example, the call attributes "5075553311, 12, 6082224444, 00" from an incoming call would be a generic match with a number list entry of "5075553311, *ANY, *ANY, *ANY", even though the first call attribute, "5075553311" is identical to the first number list data in the number list entry.
In the preferred embodiment, a number list entry cannot be an exact match a wildcard match, or a generic match to the call and environment attributes if any data in the number list entry does not match its attribute. An alternate embodiment would allow this, however, as long as at least one attribute is a match.
A number list entry that is an exact match with incoming call attributes is considered to have "won" the call and can indicate where the call should be routed. If an exact match is not found, the most optimal wildcard or generic match "wins" the call. The method of determining which wildcard or generic match is the most "optimal" will be discussed in more detail later, but is based on the number of number list entries identical to call attributes, and any user-defined weighting of importance of the number list data.
If no exact match, wildcard match, or generic match (as defined above) is found, the call is rejected.
This routing information used by a "winning" number list entry to route the telephone call can either be associated with each number list as a whole, or associated with each number list entry. The routing data can be stored with the number list or number list entry, or stored as part of an application program or other segments of storage 30 (FIG. 2).
Referring again to FIG. 4A, assume that number list 01 is intended to handle the routing of incoming calls for which no detailed information can be ascertained in advance. Any time a number list entry in number list 01 is the "winner" of the incoming call, the incoming call would be routed to the telephone corresponding to number list 01. Number list 02 is intended to handle the routing of incoming calls for "special customers" who have already called before or for whom their telephone number and perhaps other information has already been obtained. These customers can be routed quickly and accurately to the telemarketer operating the telephone corresponding to number list 02. Enough detailed information can be included with the call to enable the telemarketer to answer the phone with a very personalized greeting, such as "Hello, Ms. Applegate! Have you made any decisions about that sweater you were asking about before? "
Number list 03 is intended to handle the routing of incoming calls from customers who have not called before but who have indicated a specific inquiry. For example, any incoming call containing a called party subaddress of "21" would indicate that the customer wants to know more about medications to reverse male pattern baldness, so the call can automatically be routed to a telemarketer knowledgeable in this subject.
FIG. 4B shows the search trees associated with the number lists of FIG. 4A. As discussed previously, each search tree contains sorted number list data from a corresponding column of each number list.
FIG. 5 shows an exemplary number list of the invention that could be used in a residential or small office application, where the terminal equipment receives only a few telephone calls daily. One number list is shown. This number list contains seven columns of number list data. The first four columns have been described previously. The fifth column indicates the day of the week the call was received. This information can either be received as a call attribute or determined by processor 23 (FIG. 2) by querying the system date stored in storage 30. The sixth column contains occupant status information. This information is used to match an "environment attribute" not included as part of an incoming call but indicated by the receiver of the call. If one or more environment attributes are present, they are added to and treated the same as the call attributes received with the call, as will be explained in more detail later. In our example, occupant status information indicates if the occupants are gone, not busy, or working. The last column contains routing information. Unlike the example of FIG. 3A, this routing data is stored directly in each number list entry.
In our example of FIG. 5A, the terminal equipment is contained in a master telephone located in the Johnson family's house. The Johnson's have three phone lines coming into their house: 5071111111 is the residence phone number, 5072222222 is the phone number of Ms. Johnson's small accounting business she has in their basement, and 507333333 is the phone number of the Johnson's talkative teenager, Tiffany.
A routing code of "01" and "02" both route an incoming call to the phone in the kitchen, but "02" rings the phone with a double ring. Likewise, "03" and "04" both route an incoming call to the phone in the basement office, with "04" causing a double ring, and "05" and "06" both route an incoming call to the phone in Tiffany's bedroom, with "06" causing a double ring. A routing code of "00" indicates explicitly that the call should not be accepted, and a routing code of "10" indicates that the call should be routed to the family answering machine.
If the first entry of the number list is the "winning" entry, the incoming phone call will be routed to the phone in the kitchen and ring with a single ring. If the fourth entry of the number list is the "winning" entry, the incoming phone call is from a special client of Ms. Johnson's business and is routed to the phone in her office and rings with a double ring. If the eighth entry of the number list is the "winning" entry, the call is from James Jilted, Tiffany's old boyfriend. Tiffany inputted this entry into the number list so that incoming phone calls received from James' telephone number would not be accepted.
In the preferred embodiment, search trees similar to the search trees of FIG. 4B are associated with the number list of FIG. 5. As discussed previously, each search tree contains sorted number lilt data from a corresponding column of the number list. In the case of a single number list or a small number of number lists, the productivity enhancement of using search trees may not justify their use.
FIGS. 6A-6C show a flowchart of how terminal equipment 20 is programmed to carry out the invention. Block 101 initializes a variable called "Count" for each number lists entry to a value of -1. Block 102 parses or divides the call information associated with the incoming call into one or more call attributes. Using our example of our inbound telemarketing application of FIG. 4, block 102 parses the call information into four call attributes known as Attribute(1), Attribute(2), Attribute(3), and Attribute(4). Attribute(1) corresponds to calling party number, Attribute(2) corresponds to calling party subaddress, and so on. Block 102 also makes a backup copy of these attributes so that the flowchart of FIGS. 6A-6C always operate on the correct information. This backup copy is used to restore the attribute to its original value if the attribute becomes truncated or genericized as part of a specific processing operation.
Block 110 checks to see if any environment attributes will be needed as part of the decision process. As discussed previously, an environment attribute is not a part of a call but indicated by the receiver of the call. If one or more environment attributes (such as occupant status of FIG. 5A) exist, the value of the attributes are determined and they are added to the call attributes determined in block 102. A backup copy of the environment attributes is also made in block 110. In our example, there are no environment attributes.
To help explain the flowchart, lets assume that a call is received and block 102 parses the call information into the following Attributes:
Block 103 searches the first search tree for an entry that matches Attribute (1). Block 103 determines that entry 201 of the first search tree matches Attribute(1), so block 104 is answered affirmatively. Block 105 remembers the number list (02) and the row of the number list (also 02) contained in entry 201. Block 106 asks if Attribute(1) is *ANY or indicates a wildcard match. Since we have an exact match, block 106 is answered negatively, and block 107 sets the Count for this number list entry equal to the user-defined weight of Attribute(1). The telemarketing center has the ability to decide that some call attributes are more important than others and assign different weighting factors to them. For example, the center might assign a weighting factor of 0.5 to Attribute(2) and a value of 1.0 to the remaining attributes, thereby indicating that Attribute(2) is only half as important as the remaining attributes. For our purposes, let us assume that all attributes have a default weighting factor of 1.0. If this is the case, block 107 sets Count=1. Block 108 sets counter variable "j"=2 in preparation for checking the next attribute.
Block 120 (FIG. 6B) checks to see if the next call attribute matches the next column of number list data in the number list entry that matched the previous call attribute. In our example of FIG. 4, entry 202 of the second search tree is checked to see if the data in the first column of entry 202 matches Attribute(2). Since Attribute(2)=16, a match is made, so flow of control continues to block 122. Block 122 asks if Attribute(j) is *ANY or indicates a wildcard match. Since we have an exact match, block 122 is answered negatively, and block 123 increments Count for this number list entry by the user-defined weight of Attribute(2). In our example, block 123 increments Count to 2.
Block 124 sees if there is another call attribute to check. Since Attribute(3) remains to be checked for a match, the variable "j" is incremented to 3 and blocks 120-123 are reexecuted. These blocks determine that there is a match between search tree entry 203 and Attribute(3), so Count is incremented to 3. Since Attribute(4) remains to be checked, blocks 120-123 are again reexecuted. These blocks determine that there is a match between search tree entry 204 and Attribute(4), so Count is incremented to 4 for this number list entry. Block 124 determines that there are no more attributes to check, so flow of control returns to block 103 of FIG. 6A. In our example, Count=4 indicates an exact match for number list entry 301 of FIG. 4A.
Block 103 checks the first search tree again to see if there are any other matches for Attribute(1). Since no other entries besides entry 201 contain the value "6085551111", no match is found and block 104 is answered negatively. Block 130 asks if all wildcards for Attribute(1) have been checked. Since we haven't checked any wildcards yet, block 130 is answered negatively, and block 132 truncates Attribute(1) by chopping off one character and replacing any chopped off characters with a single "#". Therefore, Attribute(1) is now "608555111#". Blocks 103, 104, 130, and 132 are repeatedly executed until a wildcard match is found or until all characters of Attribute(1) have been truncated. In our example, Attribute(1) is repeatedly truncated until it is "608#". At this point, block 130 finds a match with search tree entry 205, and block 105 is executed to save the number list and row of entry 205. Block 106 once again asks if Attribute(1)=*ANY or is a wildcard match. Since we do have a wildcard match, the variable Count associated with this number lists entry is changed from -1 to 0, thereby indicating that this entry contains a valid match. Block 108 sets j=2 and blocks 120-123 check to see if the first column of search tree entry 206 matches Attribute(2). Since both of these values are 16, there is a match, and Count is incremented to 1.
Block 125 sets j=3 and blocks 120-122 check to see if the first column of search tree entry 207 matches Attribute(3). Since Attribute(3)=5073337766 and the search tree entry contains a *ANY, there is not a match. Block 121 is answered negatively, and flow of control moves to block 140. Block 140 asks if all wildcards for Attribute(3) have been checked. Since we haven't checked any wildcards for this attribute yet block 140 is answered negatively, and block 142 truncates Attribute(3) by chopping off one character and replacing any chopped off characters with a single "#". Therefore, Attribute(3) is now "507333776#". Blocks 103, 104, 130, and 132 are repeatedly executed until a wildcard match is found or until all characters of Attribute(3) have been truncated. In our example, Attribute(1) is repeatedly truncated until the only thing left is a "#", without ever matching the *ANY contained in search tree entry 207. Therefore, all wildcards have been checked and block 140 is answered affirmatively.
Block 150 asks if Attribute(3)=*ANY. Since Attribute(3) is now a "#", block 150 is answered negatively and block 152 sets Attribute(3)=*ANY. Flow returns to block 120 which checks to see if the first column of search tree entry 207 now matches Attribute(3). Since both of these values are now *ANY, there is a match. Block 122 is answered affirmatively, however, so Count is not incremented. As is the case with a wildcard match, the Count is not incremented for a generic match. Block 124 indicates that there is one more attribute to check, so j is incremented to 4, and we go back to block 120.
This time, blocks 120-122 check to see if the first column of search tree entry 208 matches Attribute(4). Since Attribute(4)=21 and the search tree entry contains a 99, there is not a match. Block 121 is answered negatively, and flow of control moves to block 140. Blocks 140 and 142 are executed until Attribute(4)="#" with no match being found. Blocks 150 and 152 then set Attribute(4) to *ANY, but this time block 121 is answered negatively, because *ANY does not match 99. Since all wildcards have been checked and Attribute(4) is *ANY, block 150 is answered negatively. When block 150 is answered negatively, we know that we have found an entry that did not match--i.e. no exact match, wildcard match, or generic match. In the preferred embodiment, a number list entry cannot "win" a call if it contains an entry that doesn't match a call attribute. Therefore, block 155 resets Count back to -1 for this entry, thereby indicating an unacceptable result has been reached. In an alternate embodiment, a number list entry can "win" a call if it contains an entry that doesn't match a call attribute and it has the highest Count. In this embodiment, block 155 does not exist.
In either embodiment block 156 restores the attributes to their original values from the backup copy stored in blocks 102, and/or block 110, and flow again returns back to block 103. Block 103 checks the first search tree again to see if there are any other matches for Attribute(1). Since no other entries besides entry 201 contain the value "6085551111", no match is found, and block 104 is answered negatively. Block 130 asks if all wildcards for Attribute(1) have been checked. Since we have checked these wildcards already, block 130 is answered positively. Block 160 asks if Attribute(1)=*ANY. Since Attribute(1) is not *ANY, block 160 is answered negatively, and block 162 sets Attribute(1)=*ANY. Flow returns to block 103 which checks to see if the first column of search tree entry 209 now matches Attribute(1). Since both of these values are now *ANY, there is a match. Blocks 104 and 106 are answered affirmatively, and block 109 sets the Count for the entry to 0.
Blocks 120, 121, 140, 150 152 103-108, 120, 121, 122, 124, and 125 are repeatedly executed and determine that search tree entries 210, 211, and 212, like search tree entry 209, all contain generic matches. Block 124 is answered negatively when the last attribute has been checked, and flow returns back to block 103. Note that the Count for this number list entry is 0.
Block 103 eventually finds the other instances where *ANY is located in the first column of a search tree entry and eventually determines that these number list entries are not acceptable since they contain one or more mismatches. When all of these entries have been checked, block 160 is answered affirmatively, indicating that all searching is complete. Flow of control moves to block 170.
Block 170 searches for the number list entry with the highest Count. It determines that number list entry 301 has a Count of 4, entry 302 has a Count of 1, entry 303 has a Count of 0, and the remainder of the entries have Counts of -1. Therefore, it determines that number list entry 301 is the "winner" with a count of 4. In the case of a tie, the "winner" can be selected randomly, or another tie breaking mechanism can be used.
Block 171 asks if the Count for the winning number list entry is valid. In the preferred embodiment, any count greater than or equal to 0 is valid, although this determination could be different if desired. Since number list entry 301 has a valid count of 4, block 172 routes the call as indicated in the number list entry or number list. In our example, the call is routed to the telemarketer corresponding to number list 02, since number list entry 301 is a member of number list 02. The program then ends in block 190. If a valid number list was not found, the call would be rejected in block 175.
The number list data contained in the number lists, as well as the weights assigned to the call attributes, can be easily modified by the user, as shown in the screens of FIG. 7.
While this invention has been described with respect to the preferred embodiment, it will be understood by those skilled in the art that various changes in detail may be made therein without departing from the spirit, scope and teaching of the invention. For example, although most of the discussion has concentrated on voice applications, acceptance/rejection and routing of data calls between computers could also use this invention. This invention would be particularly useful as a security mechanism for remote terminals connected to a host computer via a dial-up network. In addition, other mechanisms for inputting/changing data in a number list, such as using the keypad of the telephone itself, could be used instead of the screens of FIGS. 7A-C. Accordingly, the herein disclosed is to be limited only as specified in the following claims.
|Brevet cité||Date de dépôt||Date de publication||Déposant||Titre|
|US4277649 *||18 janv. 1980||7 juil. 1981||Bell Telephone Laboratories, Incorporated||Method and apparatus for screening telephone calls|
|US4797915 *||9 oct. 1986||10 janv. 1989||American Telephone And Telegraph Company||Communication system having automatic call route selection|
|US4866762 *||4 avr. 1988||12 sept. 1989||Pintar Robert R||Apparatus for restricting telephone calls|
|US4907256 *||27 avr. 1989||6 mars 1990||Fujitsu Limited||Exchange system having originating call restriction function|
|US4907259 *||6 nov. 1987||6 mars 1990||American Telephone And Telegraph Company, At&T Bell Laboratories||Call appearance reservation arrangement|
|US4958153 *||6 avr. 1988||18 sept. 1990||Nec Corporation||Method and apparatus for priority control of incoming calls at ISDN terminals|
|US5029196 *||11 juil. 1988||2 juil. 1991||Dytel Corporation||Automated call screening|
|US5036535 *||27 nov. 1989||30 juil. 1991||Unifi Communications Corporation||Switchless automatic call distribution system|
|US5268958 *||24 févr. 1992||7 déc. 1993||Kabushiki Kaisha Toshiba||Method for allocating incoming-call to extension telephone sets in private branch exchange and private branch exchange having automatic incoming-call allocating function|
|EP0347155A2 *||13 juin 1989||20 déc. 1989||Canon Kabushiki Kaisha||Communication apparatus|
|EP0420623A2 *||27 sept. 1990||3 avr. 1991||Canon Kabushiki Kaisha||Communication apparatus and method|
|JPH01149650A *||Titre non disponible|
|JPS53136907A *||Titre non disponible|
|1||"ISDN Feature Telephones", NEC Research & Development, No. 99, Oct. 1990, Tokyo, Japan, pp. 84-89, K. Horibe.|
|2||*||Guaranteed Delay For Voice Traffic In An Integrated Packet Switched Network, IBM Technical Disclosure Bulletin, vol. 29, No. 9, Feb. 1987, pp. 3756 3758, P. M. Gopal; B. K. Kadaba.|
|3||Guaranteed Delay For Voice Traffic In An Integrated Packet-Switched Network, IBM Technical Disclosure Bulletin, vol. 29, No. 9, Feb. 1987, pp. 3756-3758, P. M. Gopal; B. K. Kadaba.|
|4||*||ISDN Feature Telephones , NEC Research & Development, No. 99, Oct. 1990, Tokyo, Japan, pp. 84 89, K. Horibe.|
|5||*||Patent Abstracts of Japan, vol. 12, No. 207 (E 621), Jun. 1988 JP 63005648 Matsushita Electric, Line Terminal Equipment :, Y. Yoshiki (abstract only).|
|6||Patent Abstracts of Japan, vol. 12, No. 207 (E-621), Jun. 1988-JP-63005648 Matsushita Electric, "Line Terminal Equipment":, Y. Yoshiki (abstract only).|
|7||*||Patent Abstracts of Japan, vol. 13, No. 117 (E 731), Mar. 1989 JP 6328232 Mitsubishi Electric Corp., Control System For Call Connection in Packet Switching System , S. Kazuyuki. (abstract only).|
|8||Patent Abstracts of Japan, vol. 13, No. 117 (E-731), Mar. 1989-JP-6328232 Mitsubishi Electric Corp., "Control System For Call Connection in Packet Switching System", S. Kazuyuki. (abstract only).|
|9||*||Patent Abstracts of Japan, vol. 14, No. 151 (E 906) Mar. 1990 JP 2011048 Matsushita Electric, ISDN Terminal Equipment , T. Atsushi.|
|10||Patent Abstracts of Japan, vol. 14, No. 151 (E-906) Mar. 1990-JP-2011048 Matsushita Electric, "ISDN Terminal Equipment", T. Atsushi.|
|11||*||Patent Abstracts of Japan, vol. 15, No. 36 (E 1027) Jan. 1991 JP 2274054 Fujitsu Ltd., Line Switching Method , M. Naoyuki.|
|12||Patent Abstracts of Japan, vol. 15, No. 36 (E-1027) Jan. 1991-JP-2274054 Fujitsu Ltd., "Line Switching Method", M. Naoyuki.|
|Brevet citant||Date de dépôt||Date de publication||Déposant||Titre|
|US5581601 *||22 nov. 1994||3 déc. 1996||U.S. Philips Corporation||Communication system|
|US5583564 *||24 avr. 1995||10 déc. 1996||Lucent Technologies Inc.||Intelligent call forwarding with videophone display of forwarding destination|
|US5617471 *||25 mai 1995||1 avr. 1997||Rogers; Wesley D.||Telecommunications system for transferring a telephone call|
|US5646987 *||22 déc. 1994||8 juil. 1997||Lucent Technologies Inc.||Dynamic reallocation of calls to agent groups|
|US5651061 *||31 mars 1995||22 juil. 1997||Hitachi Telecom Technologies, Ltd.||Telephone exchange system|
|US5661788 *||24 janv. 1996||26 août 1997||Samsung Electronics Co., Ltd.||Method and system for selectively alerting user and answering preferred telephone calls|
|US5661791 *||29 mars 1995||26 août 1997||Bell Atlantic Network Services, Inc.||Method and apparatus for enhanced distinctive call redirection|
|US5675637 *||16 mai 1995||7 oct. 1997||Inventions, Inc.||Method for automatically obtaining and presenting data from multiple data sources|
|US5694398 *||31 mai 1996||2 déc. 1997||Alcatel N.V.||Network termination and network termination arrangement of a telecommunications network|
|US5729599 *||11 juin 1996||17 mars 1998||U S West, Inc.||Method and system of forwarding calls in a remote access call forwarding service of a telephone system|
|US5768356 *||20 févr. 1996||16 juin 1998||Solopoint, Inc.||User programmable personal call manager|
|US5839065 *||23 avr. 1996||17 nov. 1998||Ericsson Inc.||Validation of a forward-to-number by a mobile station|
|US5864613 *||16 sept. 1996||26 janv. 1999||Mci Communications Corporation||System and method for controlling telephone use|
|US5930338 *||4 sept. 1997||27 juil. 1999||Solopoint, Inc.||Method for handling incoming calls on a pots telephone line to a user's premises|
|US5946386 *||11 mars 1996||31 août 1999||Xantel Corporation||Call management system with call control from user workstation computers|
|US5956393 *||23 déc. 1996||21 sept. 1999||Nortel Networks Corporation||System and method for limiting call velocity attempts in a public switched telephone network|
|US5966653 *||24 juin 1996||12 oct. 1999||Ericsson Inc.||Validating a forward-to-number within a mobile telecommunications system|
|US5978469 *||21 janv. 1997||2 nov. 1999||U S West, Inc.||Apparatus for telephone extension control|
|US5991291 *||13 déc. 1996||23 nov. 1999||Sony Corporation||Server of a computer network telephone system|
|US5999606 *||30 août 1996||7 déc. 1999||U.S. Philips Corporation||Telecommunication station with call blocking and call transferring capabilities|
|US6005847 *||7 juil. 1997||21 déc. 1999||Siemens Information And Communications Network, Inc.||Method and apparatus for facilitating communication between multiple platforms via single, multi-channel communication conduit|
|US6021176 *||20 févr. 1996||1 févr. 2000||Solopoint, Inc.||Method for monitoring incoming calls to a user's premises on a pots telephone line|
|US6028858 *||7 juin 1996||22 févr. 2000||Cisco Tenchology, Inc.||ANI-dormant connections for frame relay|
|US6028922 *||3 sept. 1997||22 févr. 2000||Lucent Technologies Inc.||System for deferred call answering in a telecommunications system|
|US6058178 *||20 févr. 1996||2 mai 2000||Solopoint, Inc.||Method for routing incoming calls to a user's premises on a POTS telephone line|
|US6078804 *||15 avr. 1996||20 juin 2000||Ericsson Inc.||Providing different routing treatments for emergency calls based on subscriber specified data|
|US6111942 *||28 janv. 1997||29 août 2000||Canon Kabushiki Kaisha||Communication transfer apparatus|
|US6208854||14 mai 1998||27 mars 2001||Ameritech Corporation||System and method for routing a call to a called party's landline or wireless communication unit|
|US6359978 *||22 juin 1999||19 mars 2002||Apropros Technology||Service bureau Caller ID collection with ISDN BRI|
|US6362838||8 août 1997||26 mars 2002||Inventions, Inc.||Method for consolidation of multiple data sources|
|US6532366 *||29 janv. 1999||11 mars 2003||International Business Machines Corporation||Telephone call optimizer|
|US6563914||26 févr. 1997||13 mai 2003||Call Sciences Limited||Personal web-based teleconferencing method and system|
|US6625270||9 sept. 1999||23 sept. 2003||Telecordia Technologies, Inc.||Method, apparatus, and system for filtering incoming telephone calls|
|US6631182||29 juil. 1998||7 oct. 2003||Ameritech Corporation||Call screening apparatus and method|
|US6658103||31 août 1998||2 déc. 2003||Sbc Properties, L.P.||Method and system for generating a call processing control record|
|US6705916||23 mars 2001||16 mars 2004||Sbc Properties L.P.||System and method for routing a call to a called party's landline or wireless communication unit|
|US6771761 *||29 déc. 1999||3 août 2004||Bellsouth Intellectual Property Corporation||System and method for caller-selectable call routing from a single telephone number|
|US6785379||28 juin 1999||31 août 2004||Aspect Communications Corporation||Call management system with call control form user workstation computers|
|US6928153||29 sept. 2003||9 août 2005||Sbc Properties, L.P.||Method and system for generating a call processing control record|
|US6931116 *||8 sept. 1997||16 août 2005||Mci Communications Corporation||Multiple routing options in a telecommunications service platform|
|US7039174 *||17 nov. 2003||2 mai 2006||Victor Chartrand||System and method for routing calls to multi-function telephone numbers|
|US7123936||18 févr. 1998||17 oct. 2006||Ericsson Inc.||Cellular phone with expansion memory for audio and video storage|
|US7130402 *||23 janv. 2003||31 oct. 2006||Ntt Docomo, Inc.||Communication request processing system communication request processing method communication request processing apparatus|
|US7181201||14 janv. 2004||20 févr. 2007||Sbc Properties L.P.||System and method for routing a call to a called party's landline or wireless communication unit|
|US7197960||31 mai 2005||3 avr. 2007||Sbc Properties L.P.||Method and system for generating a call processing control record|
|US7266367 *||19 sept. 2003||4 sept. 2007||Research In Motion Limited||System and method of accessing contact information on a communication device|
|US7454197||8 janv. 2007||18 nov. 2008||At&T Knowlegdge Ventures, L.P.||System and method for routing a call to a landline communication unit or a wireless communication unit|
|US7483525 *||24 mai 2004||27 janv. 2009||Navin Chaddha||Method and system for selecting a communication channel with a recipient device over a communication network|
|US7519357||31 juil. 2007||14 avr. 2009||Research In Motion Limited||System and method for accessing contact information on a communication device|
|US7733882||9 août 2007||8 juin 2010||The Distribution Systems Research Institute||Terminal-to-terminal communication connection control method using IP transfer network|
|US7782883||10 août 2007||24 août 2010||The Distribution Systems Research Institute||Terminal-to-terminal communication connection control method using IP transfer network|
|US7860230||13 déc. 2004||28 déc. 2010||Martin Bradley J||Telephone call screening and routing device and related method|
|US7894586||11 mai 2004||22 févr. 2011||Mci Communications Corporation||Multiple routing options in a telecommunications service platform|
|US7945720 *||12 déc. 2007||17 mai 2011||Casio Hitachi Mobile Communications Co., Ltd.||Terminal apparatus and method for controlling processing of an interrupt event|
|US7948995||8 août 2007||24 mai 2011||The Distribution Systems Research Institute||Terminal-to-terminal communication connection control method using IP transfer network|
|US8060109||31 oct. 2007||15 nov. 2011||Enovsys Llc||Authorized location reporting mobile communication system|
|US8121113||9 août 2007||21 févr. 2012||The Distribution Systems Research Institute||Terminal-to-terminal communication connection control method using IP transfer network|
|US8155709||18 févr. 2009||10 avr. 2012||Denso Corporation||In-vehicle handsfree apparatus|
|US8190214 *||18 févr. 2009||29 mai 2012||Denso Corporation||In-vehicle handsfree apparatus|
|US8195188||15 avr. 2003||5 juin 2012||Enovsys Llc||Location reporting satellite paging system with optional blocking of location reporting|
|US8200876||28 mars 2011||12 juin 2012||Casio Hitachi Mobile Communications Co.||Terminal apparatus and method for controlling processing of an interrupt event|
|US8325899||1 déc. 2010||4 déc. 2012||Bradley J. Martin||Telephone call screening and routing device and related method|
|US8417230||9 avr. 2013||At&T Intellectual Property I, L.P.||System and method for routing a call to a landline communication unit or a wireless communication unit|
|US8433043||15 mai 2007||30 avr. 2013||Worldvoice Licensing, Inc.||Telephonic voice message transmission control method|
|US8553677||9 août 2007||8 oct. 2013||The Distribution Systems Research Institute||Terminal to-terminal communication connection control method using IP transfer network|
|US8559942||31 janv. 2011||15 oct. 2013||Mundi Fomukong||Updating a mobile device's location|
|US8565245||2 déc. 2010||22 oct. 2013||The Distribution Systems Research Institute||Terminal-to-terminal communication connection control method using IP transfer network|
|US8565403||3 déc. 2012||22 oct. 2013||Bradley J. Martin||Telephone call screening and routing device and related method|
|US8594643||8 avr. 2013||26 nov. 2013||At&T Intellectual Property I, L.P.||System and method for routing a call to a landline communication unit or a wireless communication unit|
|US8634533 *||11 nov. 2010||21 janv. 2014||At&T Intellectual Property I, L.P.||Directed notifications|
|US8706078||7 mars 2012||22 avr. 2014||Enovsys Llc||Location reporting satellite paging system with privacy feature|
|US8718257||9 juil. 2007||6 mai 2014||Francesco Ricci||Systems and methods for providing answering services|
|US8761356||21 oct. 2013||24 juin 2014||Bradley J. Martin||Telephone call screening and routing device and related method|
|US8934484||9 août 2007||13 janv. 2015||The Distribution Systems Research Institute||Terminal-to-terminal communication connection control method using IP transfer network|
|US8948161||1 déc. 2011||3 févr. 2015||The Distribution Systems Research Institute||Terminal-to-terminal communication connection control method using IP transfer network|
|US8948365||17 mars 2014||3 févr. 2015||New I.P. Investments, Llc||Systems and methods for providing answering services|
|US9026184||18 févr. 2009||5 mai 2015||Denso Corporation||In-vehicle handsfree apparatus|
|US9084100||4 nov. 2013||14 juil. 2015||Rpx Corporation|
|US20020077098 *||19 déc. 2000||20 juin 2002||Tiliks Dianna I.||Method and system for dual ringing of a centrex line and a wireless extension of the centrex line|
|US20040120492 *||29 sept. 2003||24 juin 2004||Lew Gavin Sueo||Method and system for generating a call processing control record|
|US20040208305 *||11 mai 2004||21 oct. 2004||Gross Karen A.||Multiple routing options in a telecommunications service platform|
|US20040213213 *||14 janv. 2004||28 oct. 2004||Roberts Richard N||System and method for routing a call to a called party's landline or wireless communication unit|
|US20050018820 *||24 mai 2004||27 janv. 2005||Navin Chaddha||Method and system for selecting a communication channel with a recipient device over a communication network|
|US20050129206 *||13 déc. 2004||16 juin 2005||Martin Bradley J.||Telephone call screening and routing device and related method|
|US20050282578 *||19 sept. 2003||22 déc. 2005||Research In Motion Limited||System and method of accessing contact information on a communication device|
|US20060029201 *||31 mai 2005||9 févr. 2006||Sbc Properties, L.P.||Method and system for generating a call processing control record|
|US20070050084 *||22 mars 2006||1 mars 2007||Samsung Gwangju Electronics Co., Ltd.||Mobile robot system and method of remote-controlling the same|
|US20120121075 *||17 mai 2012||At&T Intellectual Property I, L.P.||Directed Notifications|
|DE19706782A1 *||20 févr. 1997||3 sept. 1998||Siemens Ag||Kommunikationssystem, insbesondere Nebenstellenkommunikationssystem|
|DE19706782C2 *||20 févr. 1997||21 janv. 1999||Siemens Ag||Verfahren für ein Kommunikationssystem|
|EP0810763A2 *||13 mai 1997||3 déc. 1997||Siemens Aktiengesellschaft||Method for checking the permissibility of call numbers of telephone calls coming from a communication system|
|EP0845913A2 *||16 oct. 1997||3 juin 1998||Gpt Limited||Private circuits|
|EP1226704A1 *||22 août 2000||31 juil. 2002||Maverick Consulting Services, Inc.||Communications control method and apparatus|
|EP1469661A1 *||7 avr. 2004||20 oct. 2004||France Telecom||Management of telephone calls in a virtual call center|
|WO2000013400A2 *||25 août 1999||9 mars 2000||Helsingin Puhelin Oyj||Method for implementing an accessibility service and for updating a routing list|
|WO2000014942A1 *||9 sept. 1999||16 mars 2000||Telcordia Tech Inc||Method, apparatus and system for filtering incoming telephone calls|
|Classification aux États-Unis||379/211.02, 379/142.06, 379/210.02, 379/356.01, 370/360|
|Classification internationale||H04M1/00, H04M3/436, H04M1/663, H04M11/00, H04M1/665, H04M1/66|
|Classification coopérative||H04M1/663, H04M3/436|
|Classification européenne||H04M1/663, H04M3/436|
|4 sept. 1998||FPAY||Fee payment|
Year of fee payment: 4
|19 sept. 2002||FPAY||Fee payment|
Year of fee payment: 8
|26 sept. 2006||FPAY||Fee payment|
Year of fee payment: 12